[HTML][HTML] Towards automated coronary artery segmentation: A systematic review
Abstract Background and Objective: Vessel segmentation is the first processing stage of 3D
medical images for both clinical and research use. Current segmentation methods are …
medical images for both clinical and research use. Current segmentation methods are …
[HTML][HTML] A 3D-convolutional neural network framework with ensemble learning techniques for multi-modal emotion recognition
ES Salama, RA El-Khoribi, ME Shoman… - Egyptian Informatics …, 2021 - Elsevier
Nowadays, human emotion recognition is a mandatory task for many human machine
interaction fields. This paper proposes a novel multi-modal human emotion recognition …
interaction fields. This paper proposes a novel multi-modal human emotion recognition …
Enhanced Arnold's cat map-AES encryption technique for medical images
MAW Shalaby, MT Saleh… - 2020 2nd novel …, 2020 - ieeexplore.ieee.org
Human's health information is considered momentous information, which is represented in
medical systems. The amount of medical image information available for analysis is …
medical systems. The amount of medical image information available for analysis is …
[PDF][PDF] Supervised fuzzy c-means techniques to solve the capacitated vehicle routing problem.
MAW Shalaby, AR Mohammed… - Int. Arab J. Inf. Technol., 2021 - academia.edu
Fuzzy C-Means (FCM) clustering technique is among the most effective partitional clustering
algorithms available in the literature. The Capacitated Vehicle Routing Problem (CVRP) is …
algorithms available in the literature. The Capacitated Vehicle Routing Problem (CVRP) is …
Modified fuzzy c-means clustering approach to solve the capacitated vehicle routing problem
MAW Shalaby, AR Mohammed… - 2020 21st International …, 2020 - ieeexplore.ieee.org
Fuzzy C-Means clustering is among the most successful clustering techniques available in
the literature. The capacitated vehicle routing problem (CVRP) is one of the most studied NP …
the literature. The capacitated vehicle routing problem (CVRP) is one of the most studied NP …
A neuro-fuzzy based approach for energy consumption and profit operation forecasting
MAW Shalaby, NR Ortiz, HH Ammar - Proceedings of the International …, 2020 - Springer
In recent years, the massive growth in the scale of data is being a key factor in the needed
data processing approaches. The efficiency of the algorithms of knowledge extraction …
data processing approaches. The efficiency of the algorithms of knowledge extraction …
Hybrid self-balancing and object tracking robot using artificial intelligence and machine vision
SR Garces, MY Beb, A Boubakari… - 2020 2nd Novel …, 2020 - ieeexplore.ieee.org
Over the past decade, mobile autonomous robots have been widely used efficiently for
different applications. Recently, self-balancing robots attracted more attention and showed …
different applications. Recently, self-balancing robots attracted more attention and showed …
FCM-based approach for locating visible video watermarks
AA Embaby, M A. Wahby Shalaby, KM Elsayed - Symmetry, 2020 - mdpi.com
The increased usage demand for digital multimedia has induced significant challenges
regarding copyright protection, which is the copy control and proof of ownership. Digital …
regarding copyright protection, which is the copy control and proof of ownership. Digital …
Modeling and control of 3-omni wheel Robot using PSO optimization and Neural Network
Omni mobile robots are one of the mobile robots that interact with humans in many areas
where it is needed to be collaborative and accurate. Committing robotics with artificial …
where it is needed to be collaborative and accurate. Committing robotics with artificial …
Modified Arnold's Cat Map-RC4 Encryption Technique for Medical Images.
MT Saleh, MAW Shalaby… - Egyptian Computer …, 2020 - search.ebscohost.com
Abstract Information security has become a requirement these days, there is this highly
sensitive data needs to be transmitted securely over networks to prevent data modification …
sensitive data needs to be transmitted securely over networks to prevent data modification …